Amazon’s AWS VPC (Virtual Private Cloud) is like a canvas. It lets you define private networks, the way they interact with each other, routing, and security. Now, it even lets you terminate VPN connections from your main corporate network out-of-the-box and, best of all, it doesn’t cost you anything to use it.
- Protection against Man-in-the-Middle Attacks, where someone is able to hear your connection and get sensitive information (e.g. cookies)
- Avoids (to some extent) some nasty Bots and Spiders
- Conveys more trust from Users, especially those who always ask “Where’s the Key Icon I’ve heard about on TV?” (e.g., your parents)
An AWS account has full permission to perform all actions on the Amazon Glacier Vault that are part of the account. However, the AWS Identity and Access Management (IAM) users don’t have any permission by default. You can control access by setting vault-level access policies using the AWS IAM service.
With AWS IAM you can create a policy for a specific user or group. This guide shows you how to set an access level policy for a vault.
In this guide we will show how to create and manage AWS cloud user access keys and signing X.509 certificates for your AWS account IAM users.
In this guide we will show you how to create and update IAM users and groups including how to configure and attach a new policy to an existing IAM group. We invite you to learn how create a new IAM user.
In this guide we will create the group ‘testIAMGrp’ without any policy at first.
AWS cloud products facilitate the way you can easily and in a reasonable time, deploy a scalable online service on Amazon cloud infrastructure. The slides include schemes that deal with the different cloud aspects such as elasticity, performance and security. The architectures demonstrated uses some advanced AWS products such as Auto-scaling, RDS, Route53 and much more. The presentation is a bit long, take your time and you will find these AWS features that can help you understand how to get more of your AWS cloud account.